General

  • Target

    -BL.zip

  • Size

    542KB

  • Sample

    230606-qhsplaec8z

  • MD5

    f971bc4c1d9a5d7fa408a41bb1dd7922

  • SHA1

    e5bb119e3d3200a64ecb5fdf653f769be850747b

  • SHA256

    fd072398dd3278431f57bb0649361b34006fe3a803d8c39549f30913a71f121a

  • SHA512

    902539dd283b3fec9a7ea0da71c68eae87642894d026d9a6dbadb7c1a2c1d7eae5a2b203ddb0957a851f78f49ca2b3c7d42de1b3255dc9867b816c9212428afe

  • SSDEEP

    12288:N3B2iSnpd6lw/9qGU5hi2eM8IO9Wc6E52a9CfqdoiYpkElskMINcJwlNr:ZB1SnpN9qnh+ToKaS6N/NcGD

Malware Config

Extracted

Family

lokibot

C2

http://185.246.220.85/project/five/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      -BL.exe

    • Size

      616KB

    • MD5

      710d9ff3b02313f81c0ea6679a219c5c

    • SHA1

      0a14506262914b6d5a502fd407d2ca36244d2ede

    • SHA256

      ddbe6aa81458808ff4ffb464a0871f0cde3e69fee90004625029ad882fc77525

    • SHA512

      3c3130fe622605ff67cb640f94be03d416f5e9637b3432cb33a3db14ab6c1f4d363abd12258a5d2fbdc6acad595c8b262fbcb3605c4541eba0f35db008abb3b4

    • SSDEEP

      12288:ssIdul2iNfmFx2iqNhujGjU7eK6H0rvoCT81qCYdoC89GWlsWc1A+l:ssIdul1lmFxU06H0cr5MqPlP+

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks